We are using Azure Application Gateway and WAF with detection mode enabled for now and for one of our web-applications what we are observing it is throwing SQL INJECTION ATTACK error message for URLS like:- /Quote/AddItemToCollection?_section=%27Vehicle%27.
Now this is a valid URL for our application and how can we avoid this false positive messages that are coming thru? as if we enabled the PREVENTION mode our web-app will not work. Any help on this guys (CRS 3.0 is enabled) but some URL's like these will be common where we use single tic and that show up.
any help to tackle this?